{"id":"https://openalex.org/W2040356834","doi":"https://doi.org/10.1117/12.384991","title":"<title>Watermark copy attack</title>","display_name":"<title>Watermark copy attack</title>","publication_year":2000,"publication_date":"2000-05-09","ids":{"openalex":"https://openalex.org/W2040356834","doi":"https://doi.org/10.1117/12.384991","mag":"2040356834"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.384991","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083309064","display_name":"Martin Kutter","orcid":null},"institutions":[],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Martin Kutter","raw_affiliation_strings":["Digital Copyright Technologies (Switzerland)"],"affiliations":[{"raw_affiliation_string":"Digital Copyright Technologies (Switzerland)","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091506990","display_name":"Slava Voloshynovskiy","orcid":"https://orcid.org/0000-0003-0416-9674"},"institutions":[{"id":"https://openalex.org/I114457229","display_name":"University of Geneva","ror":"https://ror.org/01swzsf04","country_code":"CH","type":"education","lineage":["https://openalex.org/I114457229"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Sviatoslav V. Voloshynovskiy","raw_affiliation_strings":["Digital Copyright Technologies and Univ. of Geneva (Switzerland)"],"affiliations":[{"raw_affiliation_string":"Digital Copyright Technologies and Univ. of Geneva (Switzerland)","institution_ids":["https://openalex.org/I114457229"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084179677","display_name":"Alexander Herrigel","orcid":null},"institutions":[],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Alexander Herrigel","raw_affiliation_strings":["Digital Copyright Technologies (Germany)"],"affiliations":[{"raw_affiliation_string":"Digital Copyright Technologies (Germany)","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":14.792,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":142,"citation_normalized_percentile":{"value":0.982021,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9946,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/copying","display_name":"Copying","score":0.8405516},{"id":"https://openalex.org/keywords/watermarking-attack","display_name":"Watermarking attack","score":0.4716353},{"id":"https://openalex.org/keywords/copy-protection","display_name":"Copy protection","score":0.41365758}],"concepts":[{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.97533107},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9646282},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.8405516},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.83192396},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.56842375},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5560102},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.53423214},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.53256637},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5282613},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.4716353},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46542686},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.41365758},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2064006},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1491062},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1117/12.384991","pdf_url":null,"source":{"id":"https://openalex.org/S183492911","display_name":"Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE","issn_l":"0277-786X","issn":["0277-786X","1996-756X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4247939459","https://openalex.org/W3168409739","https://openalex.org/W2508768491","https://openalex.org/W2358993821","https://openalex.org/W2158172156","https://openalex.org/W2137394636","https://openalex.org/W2040356834","https://openalex.org/W1950090249","https://openalex.org/W1559740347","https://openalex.org/W1516446231"],"abstract_inverted_index":{"Research":[0],"in":[1,131,179],"digital":[2,25],"watermarking":[3,11,114,118,168],"has":[4],"progressed":[5],"along":[6],"two":[7],"paths.":[8],"While":[9],"new":[10,50,77,90,203],"technologies":[12],"are":[13,18,95],"being":[14],"developed,":[15],"some":[16],"researchers":[17],"also":[19],"investigating":[20],"different":[21,73,188],"ways":[22],"of":[23,104,112,127,141,157,201],"attacking":[24],"watermarks.":[26],"Common":[27],"attacks":[28],"to":[29,33,39,71,164,186],"watermarks":[30,94],"usually":[31],"aim":[32],"destroy":[34,61,81],"the":[35,106,113,117,128,132,142,150,155,158,174],"embedded":[36,63,129],"watermark":[37,83,107,130,143,182],"or":[38,84],"impair":[40,85],"its":[41,86],"detection.":[42],"In":[43,190],"this":[44,76,202],"paper":[45],"we":[46,161,192],"propose":[47],"a":[48,72,82,136,181,187,194],"conceptually":[49],"attack":[51,58,78,121,160,175],"for":[52,97],"digitally":[53],"watermarked":[54],"images.":[55],"The":[56,102,120,139,170],"proposed":[57,159],"does":[59,79],"not":[60,80],"an":[62,125],"watermark,":[64],"but":[65],"copies":[66],"it":[67,88,163],"from":[68,183],"one":[69,184],"image":[70,185],"image.":[74,152,189],"Although":[75],"detection,":[87],"creates":[89],"challenges,":[91],"especially":[92],"when":[93],"used":[96],"copyright":[98],"protection":[99],"and":[100,147,166],"identification.":[101],"process":[103],"copying":[105,180],"requires":[108],"neither":[109],"algorithmic":[110],"knowledge":[111],"technology":[115],"nor":[116],"key.":[119],"is":[122,144,176],"based":[123],"on":[124],"estimation":[126],"spatial":[133],"domain":[134],"through":[135],"filtering":[137],"process.":[138],"estimate":[140],"then":[145],"adapted":[146],"inserted":[148],"into":[149],"_target":[151],"To":[153],"illustrate":[154],"performance":[156],"applied":[162],"commercial":[165],"non-commercial":[167],"schemes.":[169],"experiments":[171],"showed":[172],"that":[173],"very":[177],"effective":[178],"addition,":[191],"have":[193],"closer":[195],"look":[196],"at":[197],"application":[198],"dependent":[199],"implications":[200],"attack.":[204]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2040356834","counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":5}],"updated_date":"2025-01-07T13:48:36.541806","created_date":"2016-06-24"}